Government


A Profile in Partnership

A Profile in Partnership

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.

Cabling our Government

Cabling our Government

The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.

Crimes on Campus

Crimes on Campus

College and university campuses aren’t immune from the same types of crime, such as burglary and assault, found in any small city where thousands of people live and work closely together. Yet overall, campuses remain a mostly safe place for young adults to learn and mature.

The Long Reach of Government Security

The government has its fingers in everything, and it is necessary when you think about managing the nation’s infrastructure. Think carefully about securing the nation’s transportation system.

Introducing Kessel Run to DOD

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Adding Sound and Safety

Adding Sound and Safety

At JFK Airport, immigration officers process hundreds of international passengers per flight. With the continual influx of people combined with limited staffing, law enforcement personnel are increasingly looking for technologies to enhance their efforts to deter illegal entry or trafficking and aid in crime investigation.

Ohio County Plans to Increase Courthouse Security

Ohio County Plans to Increase Courthouse Security

Rural Ohio County works to increase security at courthouse.

The “Other” Government Shutdown Cybersecurity Risk

The “Other” Government Shutdown Cybersecurity Risk

Many furloughed employees still have access to government IT networks and systems, which makes them prime targets for criminals and nation states who are constantly seeking to steal credentials for accessing government IT systems and data.



Securing Transportation

Securing Transportation

In today’s connected world, Intelligent Transportation Systems (ITS) play vital roles managing our Nation’s critical infrastructure including roadways, interstates, intersections, ports, mass transit lines, city traffic, and urban mobility.

Sensitive Files Exposed in Oklahoma Securities Commission Data Leak

Sensitive Files Exposed in Oklahoma Securities Commission Data Leak

Millions of sensitive files were discovered on an unprotected server belonging to a state level agency.

Stop the Bleed Campaign Proves to be Working Following Shooting in Utah

Stop the Bleed Campaign Proves to be Working Following Shooting in Utah

Victims in a Utah mall shooting arrived at the hospital with tourniquets, a life-saving measure frequently taught in Stop the Bleed courses.

NASA to Boost Data Security with Blockchain Technology

NASA to Boost Data Security with Blockchain Technology

NASA plans to advance its technology security by adding blockchain.

Government Shutdown: TSA Union Warns of "Massive Security Risk"

Government Shutdown: TSA Union Warns of "Massive Security Risk"

TSA agents are calling in sick for work, and even quitting altogether, following days of unpaid work due to government shutdown.

Australian Police Examining Suspicious Packages Left at Foreign Consulates

Australian Police Examining Suspicious Packages Left at Foreign Consulates

"The packages are being examined by attending emergency services," an Australian Federal Police spokeswoman said. "The circumstances surrounding these incidents are being investigated."

Tennessee Justice Center Gets Security Upgrades

Tennessee Justice Center Gets Security Upgrades

Justice Center in Tennessee is continuing the work to create a more secure facility.

US Marine Killed in Shooting at Washington, DC Barracks

US Marine Killed in Shooting at Washington, DC Barracks

A U.S. Marine was shot and killed while on duty at Marine Barracks Washington, D.C., early Tuesday morning, according to a U.S. Marine Corps press release.

Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay

Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay

What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year.

U.S. Ballistic Missile Systems Lack Cybersecurity

U.S. Ballistic Missile Systems Lack Cybersecurity

A Department of Defense report found no anti-virus, no data encryption and no multi factor authentication.

Indiana City to Install Surveillance Cameras to Government Building

Indiana City to Install Surveillance Cameras to Government Buildings

Columbus, Ind. is adding surveillance cameras to its Department of Public Works building.

New Secret Service Pins to Include Security Feature

New Secret Service Pins to Include Security Feature

The document says the Secret Service contacted three other vendors, but none were able to “provide the expertise in manufacturing lapel emblems with any type of security technology features.”

Featured

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. More charges are expected. Read Now

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3